POC详情: acc32838f3e8a736ef06a95bd197f1068ffdf6fe

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
Technical examination of CVE-2025-32463 by Muhammed Kaya. 
介绍
CVE-2025-32463 Exploit --- Proof-of-Concept (PoC)
===============================================

> **DISCLAIMER:**\
> This repository contains a **proof-of-concept** intended only for **educational, defensive research, and authorized penetration testing**.\
> Do **NOT** use this code on systems you do not own or do not have explicit written permission to test. Unauthorized use is **illegal** and may result in criminal or civil penalties. The author assumes no liability for any misuse of this material.

Description
-----------

This PoC demonstrates a local privilege-escalation issue tracked as **CVE-2025-32463**. The vulnerability can allow a local, unprivileged user to obtain root privileges by influencing `sudo`'s use of configuration or library resolution within a chroot-like environment. The code included in this repository is for verifying and hardening systems in controlled lab environments only.

Affected Versions
-----------------

`sudo` versions prior to **1.9.17p1** (or equivalent vendor-patched releases) are known to be vulnerable. Confirm the exact affected package names and versions with your distribution vendor/security advisory.

Requirements
------------

-   Isolated, offline test environment (VM or container that you own).

-   A build toolchain if testing PoC compilation (`gcc`, `make`) when applicable.

-   Familiarity with system administration, chroot concepts, and secure testing practices.

Testing Guidance
------------------------

-   **Do not run** the PoC on production systems or systems you do not own.

-   Perform testing only in an isolated lab VM or disposable environment. Snapshot the VM before testing so you can restore it.

-   If you are a system owner verifying patch status, check your `sudo` package version and apply vendor patches rather than relying on PoC removal. Patching is the recommended remediation.

Mitigations & Recommendations
-----------------------------

-   **Patch immediately**: install vendor-supplied updates that upgrade `sudo` to **1.9.17p1** or later (or the equivalent security update for your distribution).

-   Avoid allowing untrusted users to populate or control chroot directories used by `sudo`. Ensure chroot directories are owned and writable only by administrators.

-   Ensure system configuration files (e.g., `/etc/nsswitch.conf`) and shared libraries are not referenced from user-writable locations.

-   Apply filesystem hardening (mount options like `noexec`, `nosuid`, where appropriate) and enforce strict ownership/permissions on configuration files.

-   Minimize `sudo` privileges in `sudoers` and prefer least-privilege operation models.

-   Use integrity monitoring and log monitoring to detect anomalous `sudo` activity.

Safe disclosure & responsible handling
--------------------------------------

If you discover further issues, follow responsible disclosure practices: contact the vendor, allow reasonable time for a fix, and avoid public disclosure that enables widespread exploitation before fixes are available. When publishing PoCs, prioritize defensive guidance and avoid publishing step-by-step exploit playbooks that would enable abuse.

Contact / Contributions
-----------------------

Contributions are welcome but must follow a defensive, non-actionable disclosure approach. Submit issues or pull requests that improve detection, mitigation, or safe testing guidance only.

Usage
-----------------------

```bash
chmod +x poc.sh && bash poc.sh
```

文件快照

[4.0K] /data/pocs/acc32838f3e8a736ef06a95bd197f1068ffdf6fe ├── [1.4K] poc.sh └── [3.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。